Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage

It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is ef...

Full description

Saved in:
Bibliographic Details
Published inFrontiers of information technology & electronic engineering Vol. 14; no. 2; pp. 85 - 97
Main Authors Cheng, Yong, Wang, Zhi-ying, Ma, Jun, Wu, Jiang-jiang, Mei, Song-zhu, Ren, Jiang-chun
Format Journal Article
LanguageEnglish
Published Heidelberg SP Zhejiang University Press 01.02.2013
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1869-1951
2095-9184
1869-196X
2095-9230
DOI10.1631/jzus.C1200240

Cover

Loading…
Abstract It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
AbstractList It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated arid experimentally measured performance results show that the efficient revocation scheme can reduce the data owner's workload if the revocation occurs frequently.
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
Author Yong CHENG Zhi-ying WANG Jun MA Jiang-jiang WU Song-zhu MEI Jiang-chun REN
AuthorAffiliation School of Computer,National University of Defense Technology,Changsha 410073,China
Author_xml – sequence: 1
  givenname: Yong
  surname: Cheng
  fullname: Cheng, Yong
  email: ycheng@nudt.edu.cn
  organization: School of Computer, National University of Defense Technology
– sequence: 2
  givenname: Zhi-ying
  surname: Wang
  fullname: Wang, Zhi-ying
  organization: School of Computer, National University of Defense Technology
– sequence: 3
  givenname: Jun
  surname: Ma
  fullname: Ma, Jun
  organization: School of Computer, National University of Defense Technology
– sequence: 4
  givenname: Jiang-jiang
  surname: Wu
  fullname: Wu, Jiang-jiang
  organization: School of Computer, National University of Defense Technology
– sequence: 5
  givenname: Song-zhu
  surname: Mei
  fullname: Mei, Song-zhu
  organization: School of Computer, National University of Defense Technology
– sequence: 6
  givenname: Jiang-chun
  surname: Ren
  fullname: Ren, Jiang-chun
  organization: School of Computer, National University of Defense Technology
BookMark eNp1kEtLxDAUhYMoqKNL9xU3bjrm1bRZyuALBDcK7kqa3sxkqElNUnH89XZmfIBgNnnwnXNPziHadd4BQicET4lg5GL5McTpjFCMKcc76IBUQuZEiufdn3NB9tFxjEs8LlYUUrADZK6MsdqCS1mAN69Vst5l1mXa9gsICd5T3vvO6lWmUgq2GRLkjYrQZuB0WPUbfvuwufp5UP3C6kx3fmizmHxQczhCe0Z1EY6_9gl6ur56nN3m9w83d7PL-1wzwVJuqDGtaJiAxnBJJOWgcdXgRsoKKC4MMFFJXJYNb3ApVEuV5LosccVbBpSzCTrf-vbBvw4QU_1io4auUw78EGvCeVVyRsfKJujsD7r0Q3BjuppKUpWjm8AjlW8pHXyMAUzdB_uiwqomuF4XX6-Lr7-LH3n2h9c2bUpNQdnuX9V0q4qju5tD-M3yn-D0a8zCu_nrqPnJtf5hQSRjn7HCpdk
CitedBy_id crossref_primary_10_1080_01969722_2023_2166263
crossref_primary_10_1016_j_cose_2020_102074
crossref_primary_10_1007_s10586_018_2200_5
crossref_primary_10_1109_TCE_2023_3331306
crossref_primary_10_1109_MIS_2013_140
crossref_primary_10_3390_s19071695
crossref_primary_10_1016_j_future_2018_05_032
crossref_primary_10_1371_journal_pone_0307039
crossref_primary_10_1631_FITEE_1500219
crossref_primary_10_1016_j_future_2016_08_018
crossref_primary_10_1109_ACCESS_2019_2925390
crossref_primary_10_1007_s10586_020_03069_3
crossref_primary_10_1631_FITEE_2000366
crossref_primary_10_1155_2022_7291250
crossref_primary_10_2139_ssrn_4526403
crossref_primary_10_1049_iet_com_2015_0608
crossref_primary_10_1007_s11036_018_1102_3
crossref_primary_10_1093_comjnl_bxz101
crossref_primary_10_1007_s11277_015_2990_1
Cites_doi 10.1109/INFCOM.2010.5462174
10.1109/SP.2008.12
10.1145/1755688.1755690
10.1109/SISW.2005.7
10.1145/1180405.1180418
10.1145/1966913.1966970
10.1145/2087522.2087530
10.1145/62044.62050
10.1109/TrustCom.2012.136
10.1109/TIT.2011.2104470
10.1109/TDSC.2012.49
10.1145/1533057.1533094
10.1007/978-1-4419-7659-8
10.1109/SP.2007.11
10.1145/1755688.1755720
10.1145/2414456.2414507
10.1109/SP.2010.23
10.1145/359168.359176
10.1007/978-3-642-14992-4_13
ContentType Journal Article
Copyright Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013
Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013.
Copyright_xml – notice: Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013
– notice: Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013.
DBID 2RA
92L
CQIGP
~WA
AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7SC
8FD
L7M
L~C
L~D
DOI 10.1631/jzus.C1200240
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库- 镜像站点
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central Database Suite (ProQuest)
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Collection (ProQuest)
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
Computer and Information Systems Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer Science Database
Computer and Information Systems Abstracts


Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
DocumentTitleAlternate Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
EISSN 1869-196X
2095-9230
EndPage 97
ExternalDocumentID 10_1631_jzus_C1200240
44875193
GroupedDBID -59
-5G
-BR
-~C
06D
0R~
0VY
1N0
2KG
2RA
2VQ
30V
4.4
408
40D
67Z
92L
AARTL
AAWCG
ABFTV
ABJOX
ABKCH
ABTMW
ACGFS
ADURQ
ADYFF
AEKMD
AEOHA
AEXYK
AFWTZ
AGDGC
AGQMX
AIIXL
AJRNO
ALMA_UNASSIGNED_HOLDINGS
AMKLP
BGNMA
CQIGP
DPUIP
EBS
EJD
GQ6
HF~
HMJXF
HRMNR
HZ~
I0C
I~Z
JBSCW
KOV
M4Y
MA-
NQJWS
NU0
O9-
P9O
R9I
RIG
RLLFE
RSV
S1Z
S27
S3B
SCL
SCO
SHX
SNX
SOJ
T13
TR2
TSG
U2A
UG4
VC2
~A9
~WA
ROL
AAYXX
CITATION
-SI
-S~
406
5VR
8FE
8FG
96X
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AASML
AATNV
AATVU
AAUYE
AAYIU
AAYTO
AAYZH
AAZMS
ABAKF
ABBRH
ABDBE
ABDZT
ABECU
ABFSG
ABFTD
ABJCF
ABJNI
ABMQK
ABQBU
ABRTQ
ABSXP
ABTHY
ABTKH
ABXPI
ACAOD
ACBXY
ACDTI
ACHSB
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACPIV
ACSTC
ACZOJ
ADKNI
ADKPE
ADRFC
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEMSY
AENEX
AESKC
AETCA
AEVLU
AEZWR
AFBBN
AFDZB
AFHIU
AFKRA
AFLOW
AFQWF
AFUIB
AFZKB
AGAYW
AGJBK
AGMZJ
AGQEE
AGRTI
AGWZB
AGYKE
AHBYD
AHKAY
AHPBZ
AHWEU
AHYZX
AIAKS
AIGIU
AILAN
AITGF
AIXLP
AJBLW
AJZVZ
ALFXC
AMXSW
AMYLF
ANMIH
AOCGG
ARAPS
ATHPR
AXYYD
AYFIA
AZQEC
BENPR
BGLVJ
CAJEI
CCEZO
CCPQU
CHBEP
CUBFJ
CW9
DDRTE
DNIVK
DWQXO
EBLON
EIOEI
FERAY
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FYJPI
GGCAI
GGRSB
GNUQQ
HCIFZ
IKXTQ
IWAJR
J-C
JQ2
JUIAU
JZLTJ
K7-
L6V
LLZTM
M7S
NPVJJ
O9J
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PT4
PTHSS
Q--
S..
SJYHP
SNE
SNPRN
SOHCF
SPISZ
SRMVM
SSLCW
TCJ
TGT
U1G
U5S
UOJIU
UTJUX
UZXMN
VFIZW
ZMTXR
7SC
8FD
L7M
L~C
L~D
ID FETCH-LOGICAL-c363t-f2ffd6b36ebf491924ec08b0b998e205fe3689077b4b076ad2a94c77084d3e243
IEDL.DBID U2A
ISSN 1869-1951
2095-9184
IngestDate Fri Jul 11 07:27:27 EDT 2025
Wed Aug 13 06:10:05 EDT 2025
Tue Jul 01 01:34:08 EDT 2025
Thu Apr 24 23:02:30 EDT 2025
Fri Feb 21 02:35:19 EST 2025
Wed Feb 14 10:43:57 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords TP309.2
Cryptographic access control
Revocation optimization
Cloud storage
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c363t-f2ffd6b36ebf491924ec08b0b998e205fe3689077b4b076ad2a94c77084d3e243
Notes Yong CHENG ,Zhi-ying WANG,Jun MA,Jiang-jiang WU,Song-zhu MEI,Jiang-chun REN(School of Computer,National University of Defense Technology,Changsha 410073,China)
Revocation optimization; Cryptographic access control; Cloud storage
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 2918724360
PQPubID 2044401
PageCount 13
ParticipantIDs proquest_miscellaneous_1448743216
proquest_journals_2918724360
crossref_primary_10_1631_jzus_C1200240
crossref_citationtrail_10_1631_jzus_C1200240
springer_journals_10_1631_jzus_C1200240
chongqing_primary_44875193
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-02-01
PublicationDateYYYYMMDD 2013-02-01
PublicationDate_xml – month: 02
  year: 2013
  text: 2013-02-01
  day: 01
PublicationDecade 2010
PublicationPlace Heidelberg
PublicationPlace_xml – name: Heidelberg
PublicationSubtitle Computers & Electronics
PublicationTitle Frontiers of information technology & electronic engineering
PublicationTitleAbbrev J. Zhejiang Univ. - Sci. C
PublicationTitleAlternate Journal of zhejiang university science
PublicationYear 2013
Publisher SP Zhejiang University Press
Springer Nature B.V
Publisher_xml – name: SP Zhejiang University Press
– name: Springer Nature B.V
References Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proc. 13th ACM Conf. on Computer and Communications Security, p.89–98. [doi:10.1145/1180405.1180418]
RivestR.All-or-nothing encryption and the package transformLNCS19971267210218
WatersB.Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realizationLNCS2011657153702804908
Resch, J.K., Plank, J.S., 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. Proc. 9th Usenix Conf. on File and Storage Technologies, p.191–202.
ShamirA.How to share a secretCommun. ACM197922116126135492520414.9402110.1145/359168.359176
Geambasu, R., Kohno, T., Levy, A., Levy, H.M., 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. Proc. 18th USENIX Security Symp., p.299–333.
Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273–285. [doi:10.1109/SP.2010.23]
Jahid, S., Mittal, P., Borisov, N., 2011. Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.411–415. [doi:10.1145/1966913.1966970]
Liang, X., Cao, Z., Lin, H., Shao, J., 2009. Attribute Based Proxy Re-encryption with Delegating Capabilities. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.276–286. [doi:10.1145/1533057.1533094]
Foresti, S., 2010. Preserving Privacy in Data Outsourcing. Springer. [doi:10.1007/978-1-4419-7659-8]
Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012].
BlazeM.BleumerG.StraussM.Divertible protocols and atomic proxy cryptographyLNCS199814031271441729054
LibertB.VergnaudD.Unidirectional chosenciphertext secure proxy re-encryptionIEEE Trans. Inf. Theory201157317861802281585210.1109/TIT.2011.2104470
Bethencourt, J., Sahai, A., Waters, B., 2012. Ciphertext-Policy Attribute-Based Encryption. Available from http://acsc.cs.utexas.edu/cpabe/ [Accessed on June 10, 2012].
Samarati, P., di Vimercati, S.D.C., 2010. Data Protection in Outsourcing Scenarios: Issues and Directions. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.1–14. [doi:10.1145/1755688.1755690]
Kamara, S., Lauter, K., 2010. Cryptographic Cloud Storage. Proc. 14th Int. Conf. on Financial Cryptography and Data Security, p.136–149. [doi:10.1007/978-3-642-14992-4_13]
TangY.LeeP.LuiJ.PerlmanR.Secure overlay cloud storage with access control and assured deletionIEEE Trans. Depend. Sec. Comput.20129690391610.1109/TDSC.2012.49
Kumbhare, A.G., Simmhan, Y., Prasanna, V., 2011. Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds. Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds, p.31–40. [doi:10.1145/2087522.2087530]
RabinM.O.Efficient dispersal of information for security, load balancing, and fault toleranceJ. ACM198936233534810724240677.6802410.1145/62044.62050
Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417–431. [doi:10.1109/SP.2008.12]
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-Encryption: Management of Access Control Evolution on Outsourced Data. Proc. 33rd Int. Conf. on Very Large Data Bases, p.123–134.
OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012].
Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-Policy Attribute-Based Encryption. IEEE Symp. on Security and Privacy, p.321–334. [doi:10.1109/SP.2007.11]
SahaiA.WatersB.Fuzzy identity-based encryptionLNCS200534945575572352204
Xu, L., Wu, X., Zhang, X., 2012. CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud. Proc. 7th ACM Symp. on Information, Computer and Communications Security, p.1–10.
Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462174]
Backes, M., Cachin, C., Oprea, A., 2005. Lazy Revocation in Cryptographic File Systems. Proc. 3rd IEEE Int. Security in Storage Workshop, p.1–11. [doi:10.1109/SISW.2005.7]
Yu, S., Wang, C., Ren, K., Lou, W., 2010b. Attribute Based Data Sharing with Attribute Revocation. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.261–270. [doi:10.1145/1755688.1755720]
Plank, J.S., Simmerman, S., Schuman, C.D., 2008. Jerasure: a Library in C/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2. Available from http://web.eecs.utk.edu/~plank/plank/papers/CS-08-627.html [Accessed on June 29, 2012].
BonehD.GentryC.WatersB.Collusion resistant broadcast encryption with short ciphertexts and private keysLNCS200536212582752237311
Xu, Z., Martin, K.M., 2012. Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, p.844–849. [doi:10.1109/TrustCom.2012.136]
Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html [Accessed on June 28, 2012].
Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K., 2007. Potshards: Secure Long-Term Storage without Encryption. Proc. USENIX Annual Technical Conf., p.1–11.
B. Waters (1378_CR29) 2011; 6571
1378_CR17
B. Libert (1378_CR18) 2011; 57
1378_CR16
1378_CR19
M.O. Rabin (1378_CR21) 1989; 36
A. Shamir (1378_CR26) 1979; 22
A. Sahai (1378_CR24) 2005; 3494
1378_CR13
1378_CR12
1378_CR15
1378_CR14
1378_CR31
1378_CR30
1378_CR11
1378_CR33
1378_CR10
1378_CR32
1378_CR27
D. Boneh (1378_CR7) 2005; 3621
R. Rivest (1378_CR23) 1997; 1267
Y. Tang (1378_CR28) 2012; 9
1378_CR2
1378_CR1
1378_CR5
1378_CR4
1378_CR3
1378_CR25
1378_CR20
1378_CR9
1378_CR8
1378_CR22
M. Blaze (1378_CR6) 1998; 1403
References_xml – reference: Kumbhare, A.G., Simmhan, Y., Prasanna, V., 2011. Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds. Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds, p.31–40. [doi:10.1145/2087522.2087530]
– reference: Geambasu, R., Kohno, T., Levy, A., Levy, H.M., 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. Proc. 18th USENIX Security Symp., p.299–333.
– reference: Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proc. 13th ACM Conf. on Computer and Communications Security, p.89–98. [doi:10.1145/1180405.1180418]
– reference: Liang, X., Cao, Z., Lin, H., Shao, J., 2009. Attribute Based Proxy Re-encryption with Delegating Capabilities. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.276–286. [doi:10.1145/1533057.1533094]
– reference: Yu, S., Wang, C., Ren, K., Lou, W., 2010b. Attribute Based Data Sharing with Attribute Revocation. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.261–270. [doi:10.1145/1755688.1755720]
– reference: OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012].
– reference: Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012].
– reference: Foresti, S., 2010. Preserving Privacy in Data Outsourcing. Springer. [doi:10.1007/978-1-4419-7659-8]
– reference: Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K., 2007. Potshards: Secure Long-Term Storage without Encryption. Proc. USENIX Annual Technical Conf., p.1–11.
– reference: Xu, L., Wu, X., Zhang, X., 2012. CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud. Proc. 7th ACM Symp. on Information, Computer and Communications Security, p.1–10.
– reference: Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html [Accessed on June 28, 2012].
– reference: Backes, M., Cachin, C., Oprea, A., 2005. Lazy Revocation in Cryptographic File Systems. Proc. 3rd IEEE Int. Security in Storage Workshop, p.1–11. [doi:10.1109/SISW.2005.7]
– reference: SahaiA.WatersB.Fuzzy identity-based encryptionLNCS200534945575572352204
– reference: Xu, Z., Martin, K.M., 2012. Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, p.844–849. [doi:10.1109/TrustCom.2012.136]
– reference: Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417–431. [doi:10.1109/SP.2008.12]
– reference: Bethencourt, J., Sahai, A., Waters, B., 2012. Ciphertext-Policy Attribute-Based Encryption. Available from http://acsc.cs.utexas.edu/cpabe/ [Accessed on June 10, 2012].
– reference: Jahid, S., Mittal, P., Borisov, N., 2011. Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.411–415. [doi:10.1145/1966913.1966970]
– reference: BonehD.GentryC.WatersB.Collusion resistant broadcast encryption with short ciphertexts and private keysLNCS200536212582752237311
– reference: Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273–285. [doi:10.1109/SP.2010.23]
– reference: LibertB.VergnaudD.Unidirectional chosenciphertext secure proxy re-encryptionIEEE Trans. Inf. Theory201157317861802281585210.1109/TIT.2011.2104470
– reference: Samarati, P., di Vimercati, S.D.C., 2010. Data Protection in Outsourcing Scenarios: Issues and Directions. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.1–14. [doi:10.1145/1755688.1755690]
– reference: Resch, J.K., Plank, J.S., 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. Proc. 9th Usenix Conf. on File and Storage Technologies, p.191–202.
– reference: RabinM.O.Efficient dispersal of information for security, load balancing, and fault toleranceJ. ACM198936233534810724240677.6802410.1145/62044.62050
– reference: WatersB.Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realizationLNCS2011657153702804908
– reference: di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-Encryption: Management of Access Control Evolution on Outsourced Data. Proc. 33rd Int. Conf. on Very Large Data Bases, p.123–134.
– reference: Plank, J.S., Simmerman, S., Schuman, C.D., 2008. Jerasure: a Library in C/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2. Available from http://web.eecs.utk.edu/~plank/plank/papers/CS-08-627.html [Accessed on June 29, 2012].
– reference: BlazeM.BleumerG.StraussM.Divertible protocols and atomic proxy cryptographyLNCS199814031271441729054
– reference: ShamirA.How to share a secretCommun. ACM197922116126135492520414.9402110.1145/359168.359176
– reference: Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462174]
– reference: Kamara, S., Lauter, K., 2010. Cryptographic Cloud Storage. Proc. 14th Int. Conf. on Financial Cryptography and Data Security, p.136–149. [doi:10.1007/978-3-642-14992-4_13]
– reference: RivestR.All-or-nothing encryption and the package transformLNCS19971267210218
– reference: TangY.LeeP.LuiJ.PerlmanR.Secure overlay cloud storage with access control and assured deletionIEEE Trans. Depend. Sec. Comput.20129690391610.1109/TDSC.2012.49
– reference: Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-Policy Attribute-Based Encryption. IEEE Symp. on Security and Privacy, p.321–334. [doi:10.1109/SP.2007.11]
– ident: 1378_CR1
– ident: 1378_CR22
– ident: 1378_CR32
  doi: 10.1109/INFCOM.2010.5462174
– ident: 1378_CR5
  doi: 10.1109/SP.2008.12
– ident: 1378_CR25
  doi: 10.1145/1755688.1755690
– ident: 1378_CR20
– ident: 1378_CR2
  doi: 10.1109/SISW.2005.7
– volume: 3494
  start-page: 557
  year: 2005
  ident: 1378_CR24
  publication-title: LNCS
– ident: 1378_CR11
  doi: 10.1145/1180405.1180418
– ident: 1378_CR13
  doi: 10.1145/1966913.1966970
– ident: 1378_CR15
  doi: 10.1145/2087522.2087530
– volume: 36
  start-page: 335
  issue: 2
  year: 1989
  ident: 1378_CR21
  publication-title: J. ACM
  doi: 10.1145/62044.62050
– ident: 1378_CR31
  doi: 10.1109/TrustCom.2012.136
– volume: 57
  start-page: 1786
  issue: 3
  year: 2011
  ident: 1378_CR18
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2011.2104470
– volume: 9
  start-page: 903
  issue: 6
  year: 2012
  ident: 1378_CR28
  publication-title: IEEE Trans. Depend. Sec. Comput.
  doi: 10.1109/TDSC.2012.49
– ident: 1378_CR17
  doi: 10.1145/1533057.1533094
– ident: 1378_CR9
  doi: 10.1007/978-1-4419-7659-8
– ident: 1378_CR3
  doi: 10.1109/SP.2007.11
– volume: 3621
  start-page: 258
  year: 2005
  ident: 1378_CR7
  publication-title: LNCS
– ident: 1378_CR19
– ident: 1378_CR27
– ident: 1378_CR8
– ident: 1378_CR4
– ident: 1378_CR33
  doi: 10.1145/1755688.1755720
– volume: 6571
  start-page: 53
  year: 2011
  ident: 1378_CR29
  publication-title: LNCS
– ident: 1378_CR30
  doi: 10.1145/2414456.2414507
– ident: 1378_CR12
– volume: 1403
  start-page: 127
  year: 1998
  ident: 1378_CR6
  publication-title: LNCS
– ident: 1378_CR10
– volume: 1267
  start-page: 210
  year: 1997
  ident: 1378_CR23
  publication-title: LNCS
– ident: 1378_CR16
  doi: 10.1109/SP.2010.23
– volume: 22
  start-page: 612
  issue: 11
  year: 1979
  ident: 1378_CR26
  publication-title: Commun. ACM
  doi: 10.1145/359168.359176
– ident: 1378_CR14
  doi: 10.1007/978-3-642-14992-4_13
SSID ssj0000355963
ssj0001619798
Score 2.1079721
Snippet It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance...
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance...
SourceID proquest
crossref
springer
chongqing
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 85
SubjectTerms Access control
Algorithms
Aridity
Cloud computing
Communications Engineering
Computer Hardware
Computer Science
Computer Systems Organization and Communication Networks
Cryptography
Customers
Data storage
Electrical Engineering
Electronics and Microelectronics
Encryption
Instrumentation
Networks
Stores
Workload
学术论文
期刊
编辑工作
英文摘要
SummonAdditionalLinks – databaseName: ProQuest Central Database Suite (ProQuest)
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELagvcAB8apIKchIqFxI69heJzkhqLaqkKgqRKXeoowfsKhKtvtAgl_PjOPsAgKOSSw78oxn5huPvmHspQLpS9mGHDwAAhQIeasCpcOsAGlRpRwBxQ_n5uxSv7-aXKWE2zKVVY42MRpq11vKkR_LuqhKqZURb-Y3OXWNotvV1ELjNttFE1wh-Np9Nz2_-LjNsiA-KGNDXCliU8JKJ6JNo4rjrz_Wy6OTQkaiLyJX-NJ3n2_QZfzupLaR5x-XpdEHnd5n91LwyN8O0n7AbvnuIbv7C6XgIxamkRMCXQlf-G_9kJDjs47bGREIUJ1HPo9cwLxdDd2ufE6uzHHU18X3aEH48CI-DpTWM8vtdb92nIop0QQ9Zpen008nZ3nqpZBbZdQqDzIEZ0AZD0HXhLq8FRUIQLjlpZgEr0yFQLkEDaI0rZNtrW1Ziko75XHf99hO13f-CePGWTmxZRVqBdqiAQAw3tTgla-Esz5j-5uNbOYDZ0ajCRhhsJix1-PONjaxkFMzjOuG0AgKpSGhNKNQMna4GT5O9Y-BB6OYmnQKl81WZzL2YvMZzw9dirSd73GCgv5MK1mYjL0axbud4q-L7f9_safsjoxNM6jo5YDtrBZr_wxDlxU8T_r5E_Bn8EI
  priority: 102
  providerName: ProQuest
Title Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
URI http://lib.cqvip.com/qk/89589X/201302/44875193.html
https://link.springer.com/article/10.1631/jzus.C1200240
https://www.proquest.com/docview/2918724360
https://www.proquest.com/docview/1448743216
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYED0AJiS1kZqSoXQhPb6yTHUu1SVaKqKlbqLco4NiyqkrLdrVR-PTNOsuXRShyTWGPL4_HMZ0--AdhTKF0qSx-hQySAgj4qlefjMBujtLSkKgaKn0_N8VSfXIwu1uCg_xcmZLv3V5Jhp2azNio5-P5zef3hKJGBlWsdNkcM22kBT-Xh6lAlJu-Zh-ppXGkpSih86Hg1_5HAXArfmvrrD-rpT590F2j-dTcaXM7kGTzpYkVx2Cp3C9ZcvQ1P-zoMojPLbXj8G6ngc_DjwApBzkTM3U3THsmJWS3sjCkEONMjugpswKJctPWuXMTOrBIkbn4b9hDRvgiPLan1zAp72SwrwemUtAm9gOlk_OXoOOqqKURWGbWIvPS-MqiMQ69zxl3OxhnGSIDLyXjknTIZQeUUNcapKStZ5tqmaZzpSjmp1UvYqJvavQJhKitHNs18rlBb2gIQjTM5OuWyuLJuADuruS2uWtaMQjM0onBxAO_7yS5sx0PO5TAuC8YjpKeC9VT0ehrA_qp5L-qBhru95orODq8LmSdZSmM39Pnt6jNZEF-LlLVrSEDCI9NKJmYA73qN34m4t7Od_275Gh7JUEGDM2B2YWMxX7o3FMcscAjr2eTTEDY_jk_PzodhJf8CtPfzwA
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiKdIKWAkHhfSJrbXSQ4IodJlSx-nVurNxI4Ni6pkuw9Q-VH8RmacZBcQcOsxiWVbnpe_sfMNwDNhuMt46WPjjEGAYnxcCk_pMJsYblGlKgKKh0dqdCI_nA5O1-BH_y8MXavsfWJw1FVjKUe-zYs0z7gUKnkzOY-pahSdrvYlNFq12HcX3xCyzV7vvUP5Pud8uHu8M4q7qgKxFUrMY8-9r5QRyhkvC8Ifzia5SQwCD8eTgXdC5QgZMyMNgvyy4mUhbZYluayEwxlgv1fgqhSiIIvKh-9XOR1EI1kov8uTUAIxlx2tpxLp9pfvi9nWTsoDrRhROXxu6k_nGKB-D4mrfe4fR7Mh4g1vwc1uq8retrp1G9ZcfQdu_EJgeBf8bmCgwMDFpu5r06b_2Lhmdkx0BXSrJJ4E5mFWztvaWi6mwFkxtI7pRfBXrH0RHlsC7bFl9qxZVIyubqLDuwcnl7LG92G9bmr3AJiqLB_YLPeFMNKiuzFGOVUYJ1yeVNZFsLFcSD1pGTq0JBiGW9MIXvUrq23HeU6lN840YR8Uiiah6F4oEbxYNu-7-kfDzV5MurP5mV5paARPl5_RWukIpqxdgx2kNDMpeKoieNmLd9XFXwfb-P9gT-Da6PjwQB_sHe0_hOs8lOug6zabsD6fLtwj3DTNzeOgqQw-XrZp_ATpGStf
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VIiF6oFBA3VLASAgupE1sr5OIU1W6Kq-KAyv1ZsUvWFQlyzaLBL--M06yLQUkjkmssePxvOzxNwDPheE-51VIjDcGAxQTkkoE2g6zqeEWl5SjQPHjiTqeynen49M1eD3chYnZ7sORZHengVCa6nZ_7kIUcSWy_W-_lud7hxmPCF034CZq4oyW9JQfrDZYUrSkZaykRlWXkgxdiR5j8w8KhKvwtam_fMdef7dPl07ntXPSaH4md-FO7zeyg47R92DN11uwOdRkYL2IbsHGFYDB-xCOIkIE_hhb-B9Ntz3HZjWzM4IToKyPZB6RgVnVdrWvfEKGzTEkt_gZ9QnrXsTHDuB6Zpk9a5aOUWolKqQHMJ0cfT48TvrKCokVSrRJ4CE4ZYTyJsiSYjBv08KkBoMvz9Nx8EIVGDbnRpo0V5XjVSltnqeFdMJzKR7Cet3UfhuYcpaPbV6EUhhpUR0Yo7wqjRe-SJ31I9hZza2edwgaWlKYhK7jCF4Nk61tj0lOpTHONMUmyCdNfNIDn0bwYtV8IPWPhrsD53Qvk-eal1mR49gVfn62-ozSREckVe0bJJDRyKTgmRrBy4HjlyT-2tnOf7d8Crc-vZnoD29P3j-C2zwW1qDEmF1YbxdL_xjdm9Y8icv4Apv1-G8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+revocation+in+ciphertext-policy+attribute-based+encryption+based+cryptographic+cloud+storage&rft.jtitle=Journal+of+Zhejiang+University.+C+Science&rft.au=Cheng%2C+Y&rft.au=Wang%2C+Z-V&rft.au=Ma%2C+J&rft.au=Wu%2C+J-J&rft.date=2013-02-01&rft.issn=1869-1951&rft.volume=14&rft.issue=2&rft.spage=85&rft.epage=97&rft_id=info:doi/10.1631%2Fjzus.C1200240&rft.externalDBID=NO_FULL_TEXT
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F89589X%2F89589X.jpg